Skip to main content

About Sumo Logic Threat Intelligence

Threat intelligence, often abbreviated as threat intel, is information that helps you prevent or mitigate cyber attacks. Threat intelligence indicators are individual data points about threats that are gathered from external sources about various entities such as host names, file hashes, IP addresses, and other known possible sources of attack and compromise.

Threat intelligence indicators can help security analysts leverage a large body of information to surface potential threats. For example, say that a threat intelligence database has an indicator that correlates a certain IP address with known malicious activity. Because of this correlation, analysts can assume log messages with that IP address are more likely to be part of a real cyber attack.

In Sumo Logic, threat intelligence indicators are supplied by sources listed on the Threat Intelligence tab.

  • Classic UI. To access the Threat Intelligence tab, in the main Sumo Logic menu, select Manage Data > Logs > Threat Intelligence.
  • New UI. To access the Threat Intelligence tab, in the top menu select Configuration, and then under Logs select Threat Intelligence. You can also click the Go To... menu at the top of the screen and select Threat Intelligence.
    Threat Intelligence tab

The sources on the Threat Intelligence tab include:

  • _sumo_global_feed_cs. This is an out-of-the-box default source of threat indicators supplied by third party intel vendors and maintained by Sumo Logic. You cannot edit this source.
  • Other sources. The other sources on the tab are imported by Cloud SIEM administrators so that Cloud SIEM analysts can use them to find threats.

Cloud SIEM analysts can use any of these sources to find threats (see Threat Intelligence Indicators in Cloud SIEM). In addition, all Sumo Logic users can run queries against the indicators in the global feed to uncover threats (see Find Threats with Log Queries).

note

Only Cloud SIEM administrators can add threat intelligence indicators to the datastore.

Prerequisites​

Role capabilities​

To view and manage threat intelligence indicators on the Threat Intelligence tab, a Cloud SIEM administrator must have the correct role capabilities.

  1. Classic UI. In the main Sumo Logic menu, select Administration > Users and Roles.
    New UI. In the top menu select Administration, and then under Users and Roles select Roles. You can also click the Go To... menu at the top of the screen and select Roles.
  2. Click the Roles tab.
  3. Click Add Role to create a new role. Alternatively, you can select an existing role in the Roles tab and click Edit. Add the following capabilities:
    • Threat Intel
      • View Threat Intel Data Store
      • Manage Threat Intel Data Store

You do not need to be assigned these role capabilities to find threats with log queries.

Ingest threat intelligence indicators​

A Cloud SIEM administrator must first ingest the indicators before they can be used to uncover threats. Indicators can be ingested using:

After threat indicator sources are ingested, they appear on the Threat Intelligence tab and are ready to be used in Cloud SIEM rules or manual searches.

note

Only Cloud SIEM administrators can add threat intelligence indicators to the datastore.

note
  • Sumo Logic's threat intelligence data store only ingests simple threat indicators, not complex indicators that outline a series of steps or entities that make up an attack. Nor does it ingest actors, malware, or other object types.
  • The limit of the number of indicators that can be uploaded in one API call is 100.
  • When you add indicators, the event is recorded in the Audit Event Index. See Audit logging for threat intelligence.

Typical workflow​

Here is the typical workflow to set up and use threat intelligence indicators:

  1. A system administrator ingests threat intelligence indicators and adds them to the threat intelligence data store. For example, install a collector such as the STIX/TAXII 2 Client Source, and set up the collector to obtain indicators from Federal, vendor, or open services. Ingested indicators appear on the Threat Intelligence tab. You can manually add more indicators as needed, such as your own private indicators, using the Threat Intelligence tab or the Threat Intel Ingest Management APIs.
  2. Analysts use the threat indicators data to uncover threats using Cloud SIEM rules or manual searches.
  3. A system administrator occasionally checks to see why a connector isn’t ingesting data, or to see how much storage all the indicators are using. They may examine their indicators, and then if needed, delete indicators.

Audit logging for threat intelligence​

Use the Audit Event Index to view events for threat indicators, such as adding indicators, removing indicators, or changing the retention period.

Use a search like the following:

_index=sumologic_audit_events _sourceCategory=threatIntelligence
Status
Legal
Privacy Statement
Terms of Use

Copyright Β© 2025 by Sumo Logic, Inc.